Static task
static1
General
-
Target
9e2d2b652d50c69ea2ad35236a45f46ed4c018b621c8678828302c548b5df65b
-
Size
4.1MB
-
MD5
c897278c21f7e275d7d11985bc13477e
-
SHA1
5814786390b3e7fc0d9d1f76ee50d6b5c4c3bee6
-
SHA256
9e2d2b652d50c69ea2ad35236a45f46ed4c018b621c8678828302c548b5df65b
-
SHA512
fa00d67f62c464f162d1e1ef56dd7014734f3ba68d1de0030778c55b206451afb6d3b803c82f6461e8ccb62ba9a5cd1393a1dce2ccd74bef3e66cf9dbef0eaa0
-
SSDEEP
98304:WkQ9vlE42/IClsE2H/7x2GEJKvJ3jveqWmcj5YrvrY70:pQTE42/IClsF/12XJKRzepervp
Malware Config
Signatures
Files
-
9e2d2b652d50c69ea2ad35236a45f46ed4c018b621c8678828302c548b5df65b.exe windows x86
e2dab4a32c1d51b6f0939b8d93cc8583
Code Sign
45:31:af:04:45:74:68:8d:ac:85:90:3a:a7:fa:d1:86Certificate
IssuerPOSTALCODE=10305Not Before19/10/2022, 21:33Not After19/10/2023, 21:33SubjectPOSTALCODE=103054b:9f:99:ff:d9:c4:3f:39:12:9c:09:1c:9a:77:77:c6:b5:04:1d:ec:34:95:93:17:dc:1f:d2:f1:c4:73:be:f7Signer
Actual PE Digest4b:9f:99:ff:d9:c4:3f:39:12:9c:09:1c:9a:77:77:c6:b5:04:1d:ec:34:95:93:17:dc:1f:d2:f1:c4:73:be:f7Digest Algorithmsha256PE Digest MatchestrueSignature Validations
TrustedfalseVerification
Signing CertificatePOSTALCODE=1030518/10/2022, 20:49 Valid: false
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
LoadLibraryA
WriteConsoleA
GetVolumeInformationW
GetComputerNameA
VerLanguageNameW
LocalSize
InterlockedDecrement
GetSystemTimeAdjustment
SetLocaleInfoA
FindNextVolumeW
GetConsoleAliasExesLengthA
EnumSystemCodePagesW
FindNextFileW
CopyFileExA
MoveFileWithProgressA
VerifyVersionInfoA
LocalUnlock
DebugBreak
GlobalGetAtomNameW
MapViewOfFileEx
GetWindowsDirectoryA
GetModuleHandleA
lstrlenW
IsBadWritePtr
FindResourceA
GetComputerNameExA
GetProcAddress
LocalAlloc
GetStringTypeW
GetFileTime
GetConsoleAliasesLengthW
GetVolumePathNameA
GetPrivateProfileStructA
GetACP
GetProcessAffinityMask
GlobalFindAtomW
WriteConsoleW
CreateActCtxA
LoadLibraryW
InitializeCriticalSection
GetStringTypeExA
OpenMutexA
CancelDeviceWakeupRequest
RtlCaptureContext
EnterCriticalSection
GetPrivateProfileStructW
DeleteFiber
InterlockedCompareExchange
EnumDateFormatsA
EnumCalendarInfoA
InterlockedExchange
InterlockedIncrement
GetNamedPipeHandleStateA
CreateTimerQueue
GetLogicalDriveStringsW
GetTickCount
SetLastError
WideCharToMultiByte
MultiByteToWideChar
Sleep
DeleteCriticalSection
LeaveCriticalSection
RtlUnwind
RaiseException
GetLastError
HeapFree
TerminateProcess
GetCurrentProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
GetStartupInfoW
LCMapStringA
LCMapStringW
GetCPInfo
HeapAlloc
GetModuleHandleW
TlsGetValue
TlsAlloc
TlsSetValue
TlsFree
GetCurrentThreadId
HeapCreate
VirtualFree
VirtualAlloc
HeapReAlloc
ExitProcess
WriteFile
GetStdHandle
GetModuleFileNameA
GetModuleFileNameW
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetCommandLineW
SetHandleCount
GetFileType
GetStartupInfoA
QueryPerformanceCounter
GetCurrentProcessId
GetSystemTimeAsFileTime
GetOEMCP
IsValidCodePage
GetLocaleInfoA
GetStringTypeA
HeapSize
GetUserDefaultLCID
EnumSystemLocalesA
IsValidLocale
InitializeCriticalSectionAndSpinCount
SetFilePointer
GetConsoleCP
GetConsoleMode
GetLocaleInfoW
SetStdHandle
GetConsoleOutputCP
FlushFileBuffers
ReadFile
CreateFileA
CloseHandle
Sections
.text Size: 135KB - Virtual size: 135KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 3.9MB - Virtual size: 5.3MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 18KB - Virtual size: 3.1MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ